-
Notifications
You must be signed in to change notification settings - Fork 2.2k
chore(deps): bump revm 30+, alloy-evm, revm-inspectors #12094
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
f3c1f67
946c00d
60e75f8
ca0a288
e6dcf4f
ebcd477
c187326
0cb2c53
75f5d4b
00f294a
8bed26c
2237a3a
ce7aa64
222913e
d8755a4
883921d
476fd99
5293232
b45d8db
64325a0
28c0889
3554208
1090b9b
cb2aae6
74d36ad
f9e3df6
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Large diffs are not rendered by default.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -4,7 +4,7 @@ use crate::{ | |
| CheatsConfig, CheatsCtxt, DynCheatcode, Error, Result, | ||
| Vm::{self, AccountAccess}, | ||
| evm::{ | ||
| DealRecord, GasRecord, RecordAccess, | ||
| DealRecord, GasRecord, RecordAccess, journaled_account, | ||
| mock::{MockCallDataContext, MockCallReturnData}, | ||
| prank::Prank, | ||
| }, | ||
|
|
@@ -835,6 +835,8 @@ impl Cheatcodes { | |
|
|
||
| // At the target depth we set `msg.sender` | ||
| if curr_depth == prank.depth { | ||
| // Ensure new caller is loaded and touched | ||
| let _ = journaled_account(ecx, prank.new_caller); | ||
|
Comment on lines
+838
to
+839
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This fixes a regression introduced in There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. can you pls check There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. added in cb2aae6, is think this is what you are looking for There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. just a note that we touch account now twice, when calling cheatcode and here when we apply prank There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. good catch, looking at the code this should effectively be a noop but still good to be aware |
||
| call.caller = prank.new_caller; | ||
| prank_applied = true; | ||
| } | ||
|
|
@@ -1636,6 +1638,8 @@ impl Inspector<EthEvmContext<&mut dyn DatabaseExt>> for Cheatcodes { | |
|
|
||
| // At the target depth we set `msg.sender` | ||
| if curr_depth == prank.depth { | ||
| // Ensure new caller is loaded and touched | ||
| let _ = journaled_account(ecx, prank.new_caller); | ||
| input.set_caller(prank.new_caller); | ||
| prank_applied = true; | ||
| } | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -962,6 +962,7 @@ impl Inspector<EthEvmContext<&mut dyn DatabaseExt>> for InspectorStackRefMut<'_> | |
| call.input.bytes(ecx).get(..4).and_then(|selector| mocks.get(selector)) | ||
| }) { | ||
| call.bytecode_address = *target; | ||
| call.known_bytecode = None; | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. If not reset to
|
||
| } | ||
| } | ||
|
|
||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
small optimization to avoid branching